A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

Similar documents
SRI VENKATESWARA COLLEGE OF ENGINEERING

Academic Course Description

SUMMARY OF INFORMATION ON EACH COURSE

CRYPTOGRAPHY AND NETWORK SECURITY

10EC832: NETWORK SECURITY

Total No. of Questions : 09 ] [ Total No.of Pages : 02

KALASALINGAM UNIVERSITY

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

CS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background

Faculty of Science & Information Technology

Syllabus CS 430 Introduction to Computer Security Winter 2016

Computer Security: Principles and Practice

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

MLR Institute of Technology

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

For Tricia: never dull, never boring, the smartest and bravest person I know

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Cryptography and Network Security

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Name of chapter & details.

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN. Tech park ( 7 th floor)

FIT5044 Network security. Unit Guide. Semester 1, 2010

Course Name: Information and Computers Networks Security Course Code: IT423

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

BCA III Network security and Cryptography Examination-2016 Model Paper 1

C - Cryptography

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection

CS669 Network Security

C - Cryptography

Public Key Algorithms

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN A B C D

Cipher Suite Configuration Mode Commands

Request for Comments: 3110 Obsoletes: 2537 May 2001 Category: Standards Track. RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)

CS 134 Elements of Cryptography and Computer & Network Security WINTER 2018 Instructor: Gene Tsudik

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston

Department of Computer Science & Engineering Indian Institute of Technology Patna CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS

Day Hour Timing pm am am am

Topics. Number Theory Review. Public Key Cryptography

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

Cryptographic Systems

Cryptography and Network Security

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

Ref:

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Information Security: Principles and Practice Second Edition. Mark Stamp

Public Key Algorithms

CSC 774 Network Security

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Kurose & Ross, Chapters (5 th ed.)

Cryptographic Concepts

NIST Cryptographic Toolkit

Day Hour Timing pm pm am am

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF CSE COURSE PLAN

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Public Key Cryptography

Introduction. Ahmet Burak Can Hacettepe University. Information Security

Modes of Operation. Raj Jain. Washington University in St. Louis

Lecture 2 Applied Cryptography (Part 2)

Public Key Cryptography and RSA

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

Introduction to information Security

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography. Dr. Michael Schneider October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

CSC/ECE 774 Advanced Network Security

Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan)

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN. Sec. Name Office Office hour Mail id

Networks and Communications MS216 - Course Outline -

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

Introduction and Overview. Why CSCI 454/554?

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN. Hour Timing Hour Timing

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Cryptography MIS

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.

Computer Security 3/23/18

Justification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification.

Cryptography and Network Security

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Study Guide to Mideterm Exam

Transcription:

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A & B Secti Hour Timing DAY 1 6 1.25-2.15 DAY 3 1 8.00-8.50 DAY 4 1 8.00-8.50 Locati : University Building Faculty Details Sec. Office Office hour Mail id A Mrs. Krishnaveni S 1204 UB Mday to Friday Krishnaveni.s@ktr.srmuniv.ac.in 8.35 am to 5.00pm B M.S. Abirami 1204 UB 8.35 am to 5.00pm abirami.ms@ktr.srmuniv.ac.in TEXT BOOK 1. William Stallings, Cryptography & Network Security, Pears Educati, 4th Editi, 2010. 2. William Stallings and Lawrie Brown, Computer Security: Principles and Practice, PHI, 2008. REFERENCE BOOK 1.Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security, Private communicati in public world, PHI, 2nd editi, 2002. 2. Bruce Schneier, Neils Fergus, Practical Cryptography, Wiley Dreamtech India Pvt Ltd, 2003. Douglas R Sims Cryptography Theory and practice, CRC Press, 1995. ONLINE REFERENCES 1. www.williamstallings.com/security2e.html. 2. www.ocw.mit.edu/ocwweb/electrical-engineering-and-computer-science/6 857Fall2003/CourseHome/index.htm. PREREQUISITE: Computer Networks INSTRUCTIONAL OBJECTIVES This course introduces the students about 1. Ability to understand the basic working principles and utilities of various Cryptographic algorithms including secret key cryptography, hashes and message digests, and public key algorithms. 2. Ability to understand design issues and working principles of various authenticati protocols. 3. Ability to understand the design issues and working principles of various Secure communicati standards including Kerberos.

ASSESSMENT DETAILS Cycle Test I - 10 Cycle Test II - 10 Model Exam - 20 Assignment /Surprise Test - 5 Attendance - 5 Test Schedule S.No. DATE TEST TOPICS DURATION 1 As per Calendar Cycle Test - I Unit I & II 2 periods 2 As per Calendar Cycle Test - II Unit III & IV 2 periods 3 As per Calendar Model Exam All 5 units 3 Hrs DETAILED SESSION PLAN UNIT I: CONVENTIONAL AND MODERN ENCRYPTION Model of network security Security attacks, services and attacks OSI security architecture Classical encrypti techniques SDES Block cipher Principles- DES Strength of DES Block cipher design principles Block cipher mode of operati Evaluati criteria for AES RC4 - Differential and linear cryptanalysis Placement of encrypti functi traffic cfidentiality. S. No. TOPIC(S) COVERED EXECUTION METHOD ASSIGNMENT TOPIC 1 Model of network security Security attacks 2 Services and Attacks OSI security architecture 3 Classical Encrypti techniques SDES 4 Block cipher Principles TEXT BOOK/ REFERENCE T1 - William Stallings, Cryptogra phy & Network Security, Pears Educati, 4th Editi, 2010 T1 T1 T1 Assignment Problem 1 PRSENTATI ON/ SUBMISSIO N DUE DATE 3 rd week of feb 2016 COURSE OBJECTI VE 1 d,g EXPEC TED OUTCO ME

5 DES T1 Strength of DES 6 Block T1 cipher design principles and modes of operati 7 Evaluati T1 criteria for AES 8 Differential and linear cryptanalysi s Placement of encrypti functi 9 Traffic Cfidential ity. T1 UNIT II-PUBLIC KEY ENCRYPTION Number Theory Prime number Modular arithmetic Euclid s algorithm - Fermet s and Euler s theorem Primality Chinese remainder theorem Discrete logarithm Public key cryptography and RSA Key distributi Key management Diffie Hellman key exchange Elliptic curve Cryptography 10 Number Theory Prime number 11 Modular arithmetic Euclid s algorithm 12 Fermet s and Euler s theorem 13 Primality Chinese remainder theorem 14 Discrete logarithm 15 Public key cryptography and RSA 16 Key Distributi T1, S Sadagopan, Enterprise Resource Planning, Prentice Hall, 2001 Assignment Problem 2 2 nd week of March 2016 1 a,d,g

Key Managemen t 17 Diffie Hellman key exchange 18 Elliptic curve Cryptography UNIT III-AUTHENTICATION Authenticati requirement Authenticati functi MAC Hash functi Security of hash functi and MAC SHA - HMAC CMAC - Digital signature and authenticati protocols DSS 19 Authenticati Assignment 4 th week of 2 d,e,h requirement Problem 3 March 2016 20 Authenticati functi 21 MAC & Hash functi 22 Security of hash functi and MAC 23 SHA Algorithm 24 HMAC Algorithm 25 CMAC 26 Digital signature and authenticati protocols 27 DSS UNIT IV-SECURITY PRACTICE Authenticati applicatis Kerberos X.509 Authenticati services - E-mail security IP security - Web security. 28 Introducti to Assignment 2 nd week of Authenticati applicatis Problem 4 April 2016 29 Authenticati applicatis 30 Introducti to Kerberos 31 Kerberos applicatis 32 X.509 Authenticati services 3 a,d,e,h,j

33 X.509 Authenticati services 34 E-mail security 35 IP security 36 Web security UNIT V - SYSTEM SECURITY Intruder Intrusi detecti system Virus and related threats Countermeasures Firewalls design principles Trusted systems Practical implementati of cryptography and security. 37 Intruder & T1, T3 - Bret Assignment 4 th week of 3 d,e,h System Security Wagner, EllenMk, ERP, Third Editi Cengage Problem 5 April 2016 38 Intrusi detecti system 39 Virus and related threats 40 Countermeasure s 41 Introducti to Firewalls design principles 42 Sample Firewalls designs 43 Trusted systems 44 Practical implementati of cryptography 45 Practical implementati of Security Learning, 2008 Prepared by Mrs.S.Krishnaveni Approved by HOD/SWE

Assignment Topics:- SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING SE1102 & CS0427-NETWORK SECURITY The class will be divided in to groups and assigned with the following topics and evaluati will be de through presentati of group members Units Topics assigned Applicati 1. Implementati of Block Cipher principles and DES and give its advantage and disadvantage Implementati of AES using an applicati and give its advantage and disadvantage Groups assigned G1, G2 G3,G4 Evaluati through sessi by sessi by I Implementati of RSA using an applicati and give its advantage and disadvantage G5,G6 sessi by Implementati of SDES using an applicati and give its advantage and disadvantage G7,G8 sessi by Encrypti Functi Usage through an applicati with Merits and Demerits G9, G10 sessi by

Unit Topics assigned Applicati Implementati of Euclid s algorithm using the applicati II Implementati of Fermet s and Euler algorithm using the applicati Implementati of Public key cryptography and Private key using the applicati decided in Unit-I Implementati of Diffie Hellmen algorithm using the applicati Implementati of Ellyptic Key cryptography using the applicati Groups assigned G1, G2 G3,G4 G5,G6 G7,G8 G9, G10 Evaluati through sessi by sessi by sessi by sessi by sessi by Unit Topics assigned Applicati Implementati of MAC algorithm using the applicati III Implementati of HMAC algorithm using the applicati Implementati of SHA algorithm using the applicati decided in Unit-I Implementati of CMAC algorithm using the applicati Analyse the Authenticati functi used in your Digital Signature applicati Groups Evaluati assigned through G1, G2 sessi by G3,G4 sessi by G5,G6 sessi by G7,G8 sessi by G9, G10 sessi by

Units IV Topics assigned Email Security/ IP Security/ Web security Implementati wise analysis report Applicati Units Topics assigned Applicati V Firewall Design ccepts, How to detect Intruders through any applicati individually selected by each group members Groups assigned G1 to G10 Groups assigned G1, G2 G3,G4 G5,G6 G7,G8 Evaluati through sessi by Evaluati through sessi by sessi by sessi by sessi by G9, G10 sessi by Staff Signature HOD/SWE